H04L41/5032

Provision of data analytics in a telecommunication network

A communication method and a system for converging a 5.sup.th-Generation (5G) communication system for supporting higher data rates beyond a 4.sup.th-Generation (4G) system with a technology for Internet of Things (IoT) is provided. The disclosure is applied to intelligent services based on the 5G communication technology and the IoT-related technology, such as a smart home, a smart building, a smart city, a smart car, a connected car, health care, digital education, a smart retail, security and safety services. A method performed by a first entity performing a network data analytics function (NWDAF) is provided. The method includes receiving, from a second entity performing network function (NF), a first message for requesting observed service experience analytics, the first message including single-network slice selection assistance information (S-NSSAI) indicating a network slice, transmitting, to a third entity performing application function (AF) associated with the S-NSSAI, a second message for requesting service data associated with the observed service experience analytics, the second message including information on at least one application, receiving, from the third entity, the service data including at least one service experience for the at least one application, identifying the observed service experience analytics based on the service data, and transmitting, to the second entity, the observed service experience analytics.

DISCONTINUOUS RECEPTION (DRX) ENHANCEMENTS IN LTE SYSTEMS
20230018315 · 2023-01-19 ·

Embodiments of a system and method for providing DRX enhancements in LTE systems are generally described herein. In some embodiments, a system control module is provided for controlling communications via a communications interface. A processor is coupled to the system control module and is arranged to implement an inactivity timer and an on-duration timer for determining an active time for monitoring subframes on the physical downlink control channel for control signals, the processor further monitoring subframes after the active time.

System and method of closed loop analytics for network automation

Systems and methods implement closed loop analytics feedback for a transport network. A network device, such as a Network Data Analytics Function (NWDAF), receives, from a commissioning network function, an analytic information request for analytic event information and sends, to the commissioning network function, an analytic report that is responsive to the analytic information request wherein the analytic report includes a unique analytic report identifier. The network device receives, from the commissioning network function, a feedback event message that includes the analytic report identifier and a change description for a network parameter change influenced by the analytic report.

Aggregated service status reporter
11700314 · 2023-07-11 · ·

Systems as described herein may include generating an aggregated service status report for a real-time service delivery platform. A plurality of services running in a service domain may be determined. A request for a status of system behavior corresponding to a particular service may be received. Service connection details of the particular service may be discovered and metric data of real-time data movement may be tracked. Real-time snapshot aggregation of the particular service may be provided. In a variety of embodiments, a real-time system behavior report for the service across availability zones may be presented.

Methods and systems for managing a network deployed at a customer site
11700186 · 2023-07-11 · ·

Embodiments of a device and method are disclosed. In an embodiment, a method for managing a network deployed at a customer site involves at a cloud server connected to the network, receiving wireless signal strength information that are detected by wireless sensors of wireless access points (APs) of the network deployed at the customer site; and at the cloud server, automatically disabling service-level agreement (SLA) scanning and probing of a first wireless sensor of a first wireless AP of the wireless APs when the wireless signal strength information indicates that wireless signal strength of each neighbor wireless AP of the first wireless AP is below a predefined threshold.

Identifying root causes of network service degradation
20230011452 · 2023-01-12 ·

Systems and methods are provided for analyzing one or more root causes of service degradation events in a network or other environment. A method, according to one implementation, includes a step of monitoring a plurality of overlying services offered in an underlying infrastructure having a plurality of resources arranged with a specific topology. In response to detecting a negative impact on the overlying services during a predetermined time window and based on an understanding of the specific topology, the method further includes the step of identifying suspect components from the plurality of resources in the underlying infrastructure. The method also includes the step of obtaining status information with respect to the suspect components to determine a root cause of the negative impact on the overlying services.

END-TO-END SERVICE LEVEL METRIC APPROXIMATION

Described are examples for providing service level monitoring for a network hosting applications as a cloud service. A service level monitoring device may receive end-to-end measurements of service usage collected at user devices for a plurality of applications hosted as a cloud services. The service level monitoring device may determine degraded applications of the plurality of applications based on anomalies in the measurements. The service level monitoring device may determine a service level metric based on an aggregation of the degraded applications. In some examples, the service level monitoring device may detect a network outage affecting the service.

Methods and systems for improving performance of streaming media sessions
11553027 · 2023-01-10 · ·

A method for improving performance of a streaming media session between a plurality of communicating entities. Observation reports are collected from a plurality of monitoring entities. Each observation report includes information pertaining to events observed and recorded at a corresponding monitoring entity. A size of at least one window to be used for analyzing the observation reports is determined. The observation reports are analyzed using the at least one window of the determined size, to determine a correlation between the events across the observation reports. A problem encountered during the streaming media session is identified, based upon the correlation between the events. A notification is sent to at least one of the monitoring entities, based upon the problem. The notification is sent during the streaming media session.

Efficient way to perform location SLO validation

A method, apparatus, and system for performing a Location SLO check based on a location scatter table is disclosed. A location scatter table is maintained, the location scatter table indicative of updated geographical location distribution of all backups of all assets. A Location Service Level Objective (SLO) associated with a first asset is determined, the Location SLO associated with the first asset specifying one or more allowed locations where backups of the first asset are permitted to be located. All locations where at least one backup of the first asset is located are determined. A Location SLO check for the first asset is performed, wherein the Location SLO check passes when all the locations where at least one backup of the first asset is located fall within the allowed locations specified by the Location SLO.

Secure count in cloud computing networks

Inducements are provided to customers to regularly connect back to a service provider and report usage that is expressed using a count of requests from a local computing device for cloud-based operations such as packet routing, container instantiation, virtual machine (VM) utilization, calls to a service or application, and the like. The count information is reported within a secure context, such as a trusted execution environment (TEE), using public-private key pair cryptography by which key derivation is dependent on some form of counting. For example, a customer computing device that is subject to a usage license encrypts an operation count and reports it to the service provider.